WP-Stateless – WooCommerce Addon Security & Risk Analysis

wordpress.org/plugins/wp-stateless-woocommerce-addon

Provides compatibility between the WooCommerce and the WP-Stateless plugins.

100 active installs v0.0.2 PHP 8.0+ WP 5.0+ Updated Dec 16, 2024
google-cloud-storagestatelesswoocommercewoocommerce-addon-extensionwp-stateless
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Stateless – WooCommerce Addon Safe to Use in 2026?

Generally Safe

Score 92/100

WP-Stateless – WooCommerce Addon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The wp-stateless-woocommerce-addon version 0.0.2 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface vectors like AJAX handlers, REST API routes, shortcodes, or cron events significantly minimizes the plugin's exposure to external exploitation. Furthermore, the code analysis reveals adherence to secure coding practices, with no dangerous functions, no file operations, and no external HTTP requests. The complete reliance on prepared statements for SQL queries and proper output escaping for all outputs are excellent indicators of robust data handling.

The lack of any recorded vulnerabilities, including CVEs, further reinforces the plugin's current security. The taint analysis also indicates a clean slate, with no identified flows leading to unsanitized paths. While the version number 0.0.2 might suggest an early stage of development, the thoroughness of the static analysis and the complete absence of any concerning signals are highly commendable. The only observation, which is not a direct security risk but a point of consideration for future development, is the absence of nonce and capability checks. However, given the current lack of an attack surface, this is not a pressing concern at this time.

Vulnerabilities
None known

WP-Stateless – WooCommerce Addon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Stateless – WooCommerce Addon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

WP-Stateless – WooCommerce Addon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterstateless_skip_cache_bustingclass-woocommerce.php:23
filterupload_dirclass-woocommerce.php:24
actionplugins_loadedwp-stateless-woocommerce-addon.php:18
filterplugin_row_metawp-stateless-woocommerce-addon.php:25
Maintenance & Trust

WP-Stateless – WooCommerce Addon Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 16, 2024
PHP min version8.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

WP-Stateless – WooCommerce Addon Developer Profile

UDX Usability Dynamics

15 plugins · 5K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
322 days
View full developer profile
Detection Fingerprints

How We Detect WP-Stateless – WooCommerce Addon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-stateless-woocommerce-addon/assets/css/wc-settings.css/wp-content/plugins/wp-stateless-woocommerce-addon/assets/js/wc-settings.js
Script Paths
/wp-content/plugins/wp-stateless-woocommerce-addon/assets/js/wc-settings.js
Version Parameters
wp-stateless-woocommerce-addon/assets/css/wc-settings.css?ver=wp-stateless-woocommerce-addon/assets/js/wc-settings.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP-Stateless – WooCommerce Addon